Cybersecurity : Current Writings on Threats and Protection

個数:

Cybersecurity : Current Writings on Threats and Protection

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 288 p.
  • 言語 ENG
  • 商品コード 9781476674407
  • DDC分類 005.8

Full Description

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk.

This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.

Contents

Table of Contents

Acknowledgments

Preface

Part I. An Overview

1. Government Employees Unaware They Are Cyber Crime

Victims (Chelsea Binns)

2. Cybersecurity and America's Governments (Roger L. Kemp)

3. NACo Members Zero In on Cybersecurity, Tech Safety (Ariel Cohen)

4. Growing Impact of Cybercrime in Local Government (Gerald Cliff)

5. Cybersecurity: What's Your Risk? (International City/County Management Association)

6. Performance and Data Analytics: The Cincinnati Story (Harry Black)

7. The Digital Solution (Shaun Mulholland)

8. Digital Wallpapers Open Doors (Caitlin Cowart)

9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke "Fantasy World" (Fred H. Cate)

Part II. Threats and Risks

10. IoT Is Changing the Cybersecurity Industry (Larry Karisny)

11. Equifax Breach Is a Reminder of Society's Larger Cybersecurity Problems (Richard Forno)

12. Cybersecurity: Protecting Court Data (Brian McLaughlin)

13. Health-Care Industry Increasingly Faces Cybersecurity Breaches

(Margaret Steen)

14. It's in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach (Elana Gordon)

15. Explainer: What Is Hacking? (James H. ­Hamlyn-Harris)

16. How the Chinese Cyberthreat Has Evolved (Dorothy Denning)

17. Now That Russia Has Apparently Hacked America's Grid, Shoring Up Security Is More Important Than Ever (Theodore J. Kury)

18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement Federal Bureau of Investigation

19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face (Mary Scott Nabers)

20. Ransomware Attacks on the Rise in 2017 (Mary Ann Barton)

21. The Two Faces of Social Media (Martha Perego)

22. "Zero-Day" Stockpiling Puts Us All at Risk (Benjamin Dean)

Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures

23. A Plan for Cybersecurity (Cory Fleming)

24. How We Can Each Fight Cybercrime with Smarter Habits (Arun Vishwanath)

25. Simple Steps to Online Safety (Alan Shark)

26. Staying Safe on Social Networking Sites (U.S. Computer Emergency Readiness Team)

27. Seven Keys to Strengthen Your Cybersecurity Culture (Daniel J. Lohrmann)

28. Three Tips for Forming a Computer Emergency (Response Team

Kelsey Brewer)

29. Cybersecurity Strategies Governments Need (Gus "Ira" Hunt and Lalit Ahluwalia)

30. Security Pros Need a Mentor: Here's Why and How (Daniel J. Lohrmann)

31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers

(Mary Ann Barton)

32. Fighting Fake News (Marcus Banks)

33. How Airplane Crash Investigations Can Improve Cybersecurity (Scott Shackelford)

III. B. Technical Protections

34. National Cybersecurity Workforce Framework

U.S. Department of Homeland Security

35. Eliminating Network Blind Spots and Preventing Breaches

Reggie Best

36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field (Microsoft)

37. Government Data in the Cloud: Provider and User Responsibilities

(Subrata Chakrabarti)

38. Using Blockchain to Secure the "Internet of Things" (Nir Kshetri)

39. How to Protect Patrons' Digital Privacy (Anne Ford)

40. Monitoring Employees' Use of Company Computers and the Internet (Texas Workforce Commission)

41. Disaster Recovery for Technology: Best Practice

Government Finance Officers Association

III. C. Using Partnerships and Networks

42. Cybersecurity Partnerships: Strength in Numbers (Susan Miller)

43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity

Intersector Project

44. Obama's Cybersecurity Initiative (Frank J. Cilluffo and Sharon L. Cardash)

45. New Trump Executive Order on Cybersecurity (Daniel J. Lohrmann)

46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government (Office of the Director of National Intelligence

and Other Agencies)

47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns)

48. States Rush to Cash in on Cybersecurity Boom (Elaine S. Povich)

49. How the National Guard Is Protecting Cybersecurity (Colin Wood)

50. Cybersecurity and Local Governments in the United States (William Hatcher)

Part IV. Future

51. The Top 18 Security Predictions for 2018 (Daniel J. Lohrmann)

52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? (Jeremy Straub)

53. FCC Group on 5G Deployment Short on Local Input (Mary Ann Barton)

54. Thinking Strategically in the Cyber Domain (John ­O'Brien)

55. Internet, ­E-mail and Computer Use Policy (Texas Workforce Commission)

56. Consumers Who Froze Their Credit Reports

Julie Appleby

Appendix A: Glossary of Cybersecurity Terms

Joaquin Jay Gonzalez III

Appendix B: Presidential Executive Order on Strengthening

the Cybersecurity of Federal Networks and Critical

Infrastructure

Appendix C: City and County of San Francisco Cybersecurity

Policy

Appendix D: LaPorte County, Indiana, IT Computer Security

Policy

About the Contributors

Index

最近チェックした商品